Sciweavers

164 search results - page 17 / 33
» On the Incoherencies in Web Browser Access Control Policies
Sort
View
ICWE
2004
Springer
14 years 23 days ago
Reliable and Adaptable Security Engineering for Database-Web Services
The situation in engineering security for Web services that access databases is as follows: On the one hand, specifications like WSSecurity are concerned with the security managem...
Martin Wimmer, Daniela Eberhardt, Pia Ehrnlechner,...
SOCIALCOM
2010
13 years 5 months ago
OSNAC: An Ontology-based Access Control Model for Social Networking Systems
Abstract--As the information flowing around in social networking systems is mainly related or can be attributed to their users, controlling access to such information by individual...
Amirreza Masoumzadeh, James B. D. Joshi
W4A
2004
ACM
14 years 25 days ago
The user experience: designs and adaptations
Specifications for accessibility of Web page do not necessarily guarantee a usable or satisfying Web experience for persons with disabilities. The needs of many of these individua...
Vicki L. Hanson
SACMAT
2011
ACM
12 years 10 months ago
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
Cross domain resource sharing and collaborations have become pervasive in today’s service oriented organizations. Existing approaches for the realization of cross domain access ...
Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali
ICSE
2008
IEEE-ACM
14 years 8 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su